Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Zscaler ZTCA - Zscaler Zero Trust Cyber Associate

Page: 2 / 3
Total 75 questions

Why have traditional networks relied on implicit trust to connect initiators to workloads?

A.

Security breaches were historically less frequent.

B.

TCP/IP, the foundation of most networks, inherently favors connectivity over trust.

C.

It was easier to create direct P2P links between all devices, providing connectivity for rapid-downloading applications like BitTorrent and file sharing.

D.

Layer 3 ACLs are sufficient for blocking untrusted initiators.

Businesses undertake ________ to increase efficiency, improve agility, and achieve a competitive advantage.

A.

Digital transformation journeys

B.

Blue teaming exercises

C.

Red teaming exercises

D.

Disaster recovery planning

When connecting to internal applications, something that you manage, what is the right way to implement Zero Trust for inbound connections?

A.

Direct access to internal applications must never be allowed. Furthermore, internal applications should never be exposed to any untrusted initiator and thus must be dark. Only authorized users can connect.

B.

Allow direct access for on-site initiators and enforce authorization for remote connections.

C.

Allow direct access for connections from enterprise-managed devices and enforce authorization for unmanaged devices, on-site or remote.

D.

Only allow connections via a secure point-to-point VPN connection.

What types of attributes can be used to assess whether access is risky? (Select 2)

A.

The endpoint operating system of the initiator.

B.

An analysis of device posture to examine attributes such as domain joined status, a certificate, whether the device has AV/EDR installed, and whether the device is running disk encryption.

C.

Leveraging APIs available on the Layer 3 devices on the network to scan for malicious services or hosts in the environment.

D.

Seeing patterns in user behavior around things such as blocked malware downloads and blocked access to phishing sites.

Zero Trust is about controlling initiator access. This is based on validating the identity of the user, and that is the sole attribute used to control access.

A.

True

B.

False

In a Zero Trust architecture, should applications that you manage have any exposed inbound listeners?

A.

Inbound listener ports should only be accessible to those initiators who are allowed access. All other access, and visibility, must be denied.

B.

Yes, allow anyone to connect to the listening service, just like having your website on the internet for anyone to connect with.

C.

Yes, allow all inbound to any service; the firewall will protect the application.

D.

Only allow access to those who share the same network.

Verification of user and device identity is to be enabled for:

A.

Any person who wants to connect to an enterprise-controlled application, including employees, third parties, and partners.

B.

Remote employees only.

C.

Untrusted third parties only.

D.

Employees connecting from unmanaged endpoint devices only.

If you take a database from your data center and move it into the cloud, one of the legacy mechanisms for providing access is to: (Select 2)

A.

Create an inbound listener so that anyone from any network can egress via the internet and get access.

B.

Create a physical Ethernet cable between the data center and the cloud service provider.

C.

Configure the database server with a public IP and allow direct access via the internet.

D.

Extend an MPLS link to create a backhaul link to the cloud, creating an IP-routable network.

What facilitates constant and uniform application of policy enforcement?

A.

Open and clear communication channels across Network and Security teams.

B.

The policy remains the same, conditionally, and is applied equally regardless of the location of the enforcement point.

C.

Leveraging policy enforcement capabilities available through traditional security appliances.

D.

Application access happens on-premises, typically either from within the data center or the corporate campus, where large security stacks are deployed.

When delivering policy to control access, if you want to allow an initiator to get access, but not expose them to a risky destination, which enforcement policies should be used?

A.

Conditionally allow [Isolate, Steer (if need be)].

B.

Physical quarantine of the user’s device.

C.

Provide time-based access.

D.

Block.